An anatomy of crypto-enabled cyber crime